The Security Blog is written by our team of editors and includes thought provoking opinions, trends, and essential security information for security executives.
Our businesses are inundated with incidents of ransomware, malware, adware and many other intrusion variants, it’s no wonder that 90 percent of healthcare institutions have been affected, at a total cost of $6 billion a year, according to a recent study from the Ponemon Institute. As we make our way through these threats, one needs to ask; if so many companies offer solutions, and institutions hire top shelf network security engineers, why are there so many breaches?
In March, the European Commission demanded that tech firms remove terrorist posts within one hour of their appearance. Similar calls have come from corporations and commentators, alike. These forms of pressure are important but focused only on the problem of social media serving as a tool for spreading violent ideas and propaganda. Disturbingly, social media use itself may be predisposing individuals to commit terrorism, shootings and other forms of violence by impacting user behavior and well-being.
As camera counts rise and system complexity increases, it’s imperative for enterprise security leaders to make smart choices when it comes to a video management system. If you’re pondering where to start on your purchasing decision, Security spoke with someone who literally wrote the book on VMS systems – Brian Carle, Director of Product Strategy at Salient Systems.
As smartphones and wearable devices continue their exponential growth in Canada and globally – it’s expected to be worth $34 billion by 2020 – Canadians will need to be wary of the increasingly popular “Tap” payment channel (or alternative NFC wearable device) service.
Version 1.0 of the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF) celebrated its fourth birthday in February. The CSF is a “risk-based approach to managing cybersecurity risk... designed to complement existing business and cybersecurity operations.” I recently spoke with Matthew Barrett, NIST program manager for the CSF, and he provided me with a great deal of insight into using the framework.
The topic of gun control was not a foreign subject to our classrooms, but never once did we believe our school would become the epicenter of this debate. Yet, as we grieve our fallen classmates and staff members, politicians address this as “another mass shooting” and entertain the idea of arming teachers.
I just came out of a meeting addressing campus lockdowns and mass notification when my phone started buzzing. The Broward County Sheriff Department’s Alertify message stared me in the face – Active Shooter at my daughter’s school.
With the unfortunate shooting attack at Marjory Stoneman Douglas High School in Parkland, it was South Florida’s turn to witness the horrors of such an attack.
As cybersecurity continues to become more complex and harder to manage, the role of security operations for organizations is also shifting across the board. Long gone are the days where firewalls or intrusion detection systems (IDS) could keep adversaries outside the perimeter. Instead, we are seeing increases in both size and frequency of attacks leading to more pronounced impacts to the business.